Sciweavers

3712 search results - page 566 / 743
» Role-Based Access Control
Sort
View
SCAM
2007
IEEE
15 years 8 months ago
Quality Assessment for Embedded SQL
—The access of information systems to underlying relational databases is commonly programmed using embedded SQL queries. Such embedded queries may take the form of string literal...
Huib van den Brink, Rob van der Leek, Joost Visser
123
Voted
VTC
2007
IEEE
121views Communications» more  VTC 2007»
15 years 8 months ago
Downlink Traffic Power Characterization for Multi-Rate Wireless CDMA Data Networks
— The characterization of downlink traffic power is an important issue for the design of efficient call admission control (CAC) and radio resource management (RRM) procedures. In...
Ashraf S. Hasan Mahmoud
127
Voted
VTC
2007
IEEE
159views Communications» more  VTC 2007»
15 years 8 months ago
Data Fragmentation Scheme in IEEE 802.15.4 Wireless Sensor Networks
— The IEEE 802.15.4 Medium Access Control (MAC) protocol is designed for low data rate, short distance and low power communication applications such as Wireless Sensor Networks (...
Jongwon Yoon, Hyogon Kim, Jeong-Gil Ko
121
Voted
VTS
2007
IEEE
103views Hardware» more  VTS 2007»
15 years 8 months ago
At-Speed Testing of Core-Based System-on-Chip Using an Embedded Micro-Tester
In SoC designs, limited test access to internal cores, lowcost external tester’s lack of accuracy and slow frequencies make application of at-speed tests impractical. Therefore,...
Matthieu Tuna, Mounir Benabdenbi, Alain Greiner
113
Voted
ATAL
2007
Springer
15 years 8 months ago
Web services negotiation in an insurance grid
There are an increasing number of initiatives for the migration of agents research towards new Internet technologies such as the semantic web, Grid, and web services. On the one h...
Shamimabi Paurobally, Chris van Aart, Valentina A....